C:\Users\Aleksandr\Desktop\ToxicEye-master\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Debug\TelegramRAT.pdb
Behavioral task
behavioral1
Sample
378b0ac112a719e6d5f8b31603877690N.exe
Resource
win7-20240708-en
General
-
Target
378b0ac112a719e6d5f8b31603877690N.exe
-
Size
119KB
-
MD5
378b0ac112a719e6d5f8b31603877690
-
SHA1
27c6e0cdee370a6ff54efc949727c9076870dcab
-
SHA256
f23dac3626300010fbfdedaec9cf07d0890b3acec0190283ecb0b545de22ecb8
-
SHA512
c0788079b2bc9dfafc3b5cb48b45f33974bb26004b3d3c07893fdde8c56e5cd0409b3b82c7313ddfb89d31de9580ddb0be4ab3604dd49b85fc3674ec6f130588
-
SSDEEP
3072:qOfRzlXCwwFwOwWAmm+m/bxqH8QWrzCrAZu8VDpyD/d+OC:qr1SWH+/bgi1VDpyD/Y
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7335066800:AAFPnjqCOJcJkOIGjmU_-X7I-VqiZLlbktE/sendMessage?chat_id=1319796723
Signatures
-
Toxiceye family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 378b0ac112a719e6d5f8b31603877690N.exe
Files
-
378b0ac112a719e6d5f8b31603877690N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ